Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

10 Best Practices for Securing Your Workloads on AWS

by Michal Ferguson , posted in AWS Security, AWS Security Best Practices

AWS eBook Blog Banner.png

Achieving optimal security in a cloud environment can seem like a moving target. New security threats are constantly popping up along with security implementations meant to fight them off. To help you achieve optimal security in this environment, this post highlights the top 10 best practices for AWS security.

Read More [fa icon=long-arrow-right"]

May 25, 2017 9:14:49 AM

[fa icon="comment"] 0 Comments

How to Leverage Automation to Make Your Organization Secure by Design

by Michal Ferguson , posted in Cloud Security, AWS Security Best Practices, Automating AWS Security, Security by Design

Secure by Design Webinar Recap Blog Banner.png

Yesterday, we co-hosted a webinar with Amazon’s security strategist, Tim Sandage, and SessionM’s director of technical solutions and operations, Jason LaVoie, to discuss how companies can become secure by design using automation.

With cloud providers like AWS making it easier than ever to get up and running in the cloud, the next item on the agenda for many is how to get security up to speed as well. In yesterday’s webinar, Tim, Jason, and our own senior security engineer, Patrick Cable, offered practical and strategic ways for companies to do just this.

Read More [fa icon=long-arrow-right"]

May 24, 2017 2:27:26 PM

[fa icon="comment"] 0 Comments

May 17, 2017 11:32:14 AM

[fa icon="comment"] 0 Comments

Why You Don't Need to Code to Run Secure on AWS

by Megan Rees Ahigian , posted in Cloud Security, AWS Security, AWS Configuration Auditing, AWS Security Best Practices

Code Secure AWS Blog Banner.png

Amazon Web Services, the ubiquitous cloud infrastructure provider, has made it increasingly easy for businesses to move to the cloud and take advantage of the scalability, flexibility, and cost savings this approach offers. For some businesses that are contemplating the move to AWS, you may be wondering whether it’s necessary to have a team of developers who can help to ensure that you are capable of running securely on AWS.

The short answer is: You don’t need to start from scratch when it comes to security, and you don’t need  to have extensive coding resources in-house to run securely on AWS. With the right tools at your disposal, you can quickly measure compliance with  your unique security policy and adapt to changes in your environment as needed.

Here’s what you need to know to run securely on AWS, with or without a legion of development resources at your disposal.

Read More [fa icon=long-arrow-right"]

May 9, 2017 10:05:45 AM

[fa icon="comment"] 0 Comments

Incorporating AWS Security Best Practices Into Terraform Design

by Tom McLaughlin , posted in Cloud Security, Terraform, AWS Security Best Practices

Starting Your Cloud Security Journey Part 5.png

Implementing AWS security best practices into your Terraform design is an excellent way of ensuring that you have a streamlined way to achieve your security goals and manage your infrastructure.

In this post, we will talk about the following three areas of AWS security best practices and how to implement them with Terraform:

  • Environment segregation by AWS account
  • CloudTrail logging
  • Traffic and system access controls

Just to be clear, this post is not an introduction to Terraform: It’s an introduction to incorporating AWS security best practices into Terraform code.

Read More [fa icon=long-arrow-right"]

Mar 20, 2017 10:37:32 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all